Robust image authentication via locality sensitive hashing with core alignment

被引:3
作者
Ma, Qiang [1 ,2 ]
Xu, Lei [3 ]
Xing, Ling [1 ]
Wu, Bin [1 ]
机构
[1] Southwest Univ Sci & Technol, Sch Informat Engn, Mianyang 621010, Peoples R China
[2] China Acad Engn Phys, Inst Elect Engn, Mianyang 621900, Peoples R China
[3] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Image hashing; Image robust authentication; Core alignment; Locality sensitive hashing; Hashing function optimization; TRANSFORM;
D O I
10.1007/s11042-017-4625-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Robust image hashing is a promising technique to represent image's perceptual content. However, when it comes to image authentication, tradeoff between robustness and discrimination is a non-negligible issue. The allowed content preserving operations and sensitive malicious manipulations on images are quite subjective to human's perception. So it needs tactics to design good hashing methods. In this paper we incorporate the novel concept of core alignment into hashing, where the proposed core alignment improves the performances of balance. First, we formulize the hashing as a supervised minimal optimization problem based on Locality Sensitive Hashing, in which p-stable distribution is exploited to maintain high dimensional locality features. Then we solve this problem by two sub-optimization problems, i.e., searching for optimal shift and searching for optimal quantization intervals. By using particle swarm optimization and simulated annealing programming approaches we develop two stochastic solutions to those two problems, respectively. Experimental results show that our proposed hashing optimizations can find optimal solutions with limited steps, and the hashing method is superior to other state-of-the-art methods in terms of authentication and robustness.
引用
收藏
页码:7131 / 7152
页数:22
相关论文
共 34 条
[1]   Data-Dependent Hashing Based on p-Stable Distribution [J].
Bai, Xiao ;
Yang, Haichuan ;
Zhou, Jun ;
Ren, Peng ;
Cheng, Jian .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2014, 23 (12) :5033-5046
[2]  
Chen B., 2010, Proceedings 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA 2010), P100, DOI 10.1109/DICTA.2010.26
[3]  
Datar Mayur, 2004, PROC 20 S COMPUTATIO, P253
[4]   Moment patterns in the Radon space [J].
Galigekere, RR ;
Holdsworth, DW ;
Swamy, MNS ;
Fenster, A .
OPTICAL ENGINEERING, 2000, 39 (04) :1088-1097
[5]  
Gionis A, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P518
[6]   Stable distributions, pseudorandom generators, embeddings and data stream computation [J].
Indyk, P .
41ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2000, :189-197
[7]  
Kailasanathan C., 2001, P IEEE EURASIP WORKS, P1
[8]  
Kennedy J, 1995, 1995 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS PROCEEDINGS, VOLS 1-6, P1942, DOI 10.1109/icnn.1995.488968
[9]   OPTIMIZATION BY SIMULATED ANNEALING [J].
KIRKPATRICK, S ;
GELATT, CD ;
VECCHI, MP .
SCIENCE, 1983, 220 (4598) :671-680
[10]   Robust image hash in Radon transform domain for authentication [J].
Lei, Yanqiang ;
Wang, Yuangen ;
Huang, Jiwu .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2011, 26 (06) :280-288